Welcome to SecTookit, a comprehensive collection of resources, tutorials, and hands-on projects dedicated to cybersecurity and bug bounty hunting. Whether you're just starting or you're an experienced professional, you'll find everything from fundamental security concepts to advanced techniques that are actively used in the field.
Why this repo?
Itβs a dynamic and continuously updated resource focused on the latest security vulnerabilities and exploit techniques that provide essential knowledge for mastering cybersecurity and penetration testing.
This repository covers the following essential areas:
-
π Bug Bounty Roadmap
Comprehensive guide to bug bounty hunting, including starting points and strategies. -
π¨ Command Injection
Learn about command injection vulnerabilities and methods to prevent them. -
π Computer Networking
Foundational networking concepts every security professional should know. -
π Core Principles of Cyber Security
Learn about the core tenets that underpin effective security systems. -
π§βπ» Cyber Security Roadmap
A step-by-step guide to mastering the key concepts and practices in cybersecurity. -
π» HTML Injection
In-depth examination of HTML injection techniques and their remediation. -
π§βπ€ IDOR (Insecure Direct Object Reference)
Guide on identifying and exploiting IDOR vulnerabilities. -
π§ Kali Linux Commands
5000+ commands and shortcuts for efficient security testing. -
π§° Mastering HTTP Status Codes
A complete guide to HTTP status codes and their role in web app security. -
π OWASP Top 10
Detailed look at the top 10 security risks, as identified by OWASP. -
π Python Libraries for Cyber Security
A curated list of Python libraries that are useful for security testing. -
π Understanding Parameters in Web Applications
Explore how parameters function in web apps and where they become vulnerable.
This repository is structured into directories, each dedicated to a specific security topic. Hereβs a quick overview of the key directories:
βββ Bug Bounty Roadmap
βββ Command Injection
βββ Computer Networking
βββ Core Principles of Cyber Security
βββ Cyber Security Roadmap
βββ Cryptography
βββ HTML Injection
βββ IDOR Guide and Exploitation
βββ Kali Linux Commands and Shortcuts
βββ Mastering HTTP Status Codes
βββ OWASP Top 10
βββ Python Libraries for Cyber Security
βββ Understanding Parameters
Each folder contains well-documented explanations, example code snippets, and further reading.
Before you dive in, make sure you're familiar with:
- Linux commands (especially in Kali Linux)
- Basic scripting in Python for security purposes
- Understanding of web technologies like HTML, HTTP, and JavaScript
To use this repository locally or contribute to it, clone the repository using:
git clone https://github.com/n4itr0-07/SecToolkit.git
Navigate through the folders to explore the detailed notes and resources.
- Basic understanding of Linux and Kali Linux commands
- Familiarity with Python scripting for security
- Knowledge of web technologies such as HTML, HTTP, JavaScript, etc.
Contributions are always welcome! If you have suggestions for new topics, find any issues, or want to improve existing content, feel free to open a pull request or issue.
- Fork the project
- Create your feature branch (
git checkout -b feature/AmazingFeature
) - Commit your changes (
git commit -m 'Add some AmazingFeature'
) - Push to the branch (
git push origin feature/AmazingFeature
) - Open a Pull Request
This repository is licensed under the MIT License. See the LICENSE file for more information.
For any questions or suggestions, feel free to reach out:
- GitHub: N4!TR0 07
- Email: naitro_07@proton.me